External Audit
- Vulnerability Assessment: Conduct a comprehensive vulnerability assessment to identify any known vulnerabilities in the website’s software, configurations, or infrastructure.
- Penetration Testing: Perform a penetration test to identify potential attack vectors that could be exploited by attackers.
- Web Application Firewall (WAF) Configuration Review: Review the WAF configuration to ensure it is properly configured and effective at blocking malicious traffic.
- SSL/TLS Certificate Validation: Validate the SSL/TLS certificate to ensure it is properly installed and configured, and to identify any potential vulnerabilities.
- Network Security Assessment: Conduct a network security assessment to identify any vulnerabilities in the website’s network infrastructure.
- Password Policy Assessment: Evaluate the website’s password policy to ensure it is strong enough to resist brute-force attacks.
- Data Backup and Recovery Assessment: Evaluate the website’s data backup and recovery plan to ensure it is effective and up-to-date.
- Incident Response Assessment: Review the website’s incident response plan to ensure it is effective and up-to-date, and that employees are trained on how to respond to security incidents.
R 10,000.00 – R50,000.00
Architecture Audit
- Network Scanning: Conduct a comprehensive network scan to identify all devices on the network and potential vulnerabilities.
- Penetration Testing: Perform a penetration test to identify potential attack vectors that could be exploited by attackers.
- Firewall Configuration Review: Review the firewall configuration to ensure it is properly configured and effective at blocking malicious traffic.
- Password Policy Assessment: Evaluate the organization’s password policy to ensure it is strong enough to resist brute-force attacks.
- Endpoint Security Assessment: Assess the security of all endpoints (e.g. laptops, desktops, servers) to ensure they are properly secured and patched.
- Patch Management Assessment: Evaluate the organization’s patch management process to ensure all devices are up-to-date with the latest security patches.
- Employee Security Awareness Assessment: Test employees’ security awareness to determine if they are aware of and following security best practices.
- Access Control Assessment: Assess the organization’s access control policies and procedures to ensure only authorized individuals have access to sensitive data.
- Data Backup and Recovery Assessment: Evaluate the organization’s data backup and recovery plan to ensure it is effective and up-to-date.
- Incident Response Assessment: Review the organization’s incident response plan to ensure it is effective and up-to-date, and that employees are trained on how to respond to security incidents.
R 25,000.00 – R80,000.00*
*This excludes any travel costs
Full Security Audit
- Vulnerability Assessment: Conduct a comprehensive vulnerability assessment to identify any known vulnerabilities in the system’s software, configurations, or infrastructure.
- Penetration Testing: Perform a penetration test to identify potential attack vectors that could be exploited by attackers.
- Firewall Configuration Review: Review the firewall configuration to ensure it is properly configured and effective at blocking malicious traffic.
- Password Policy Assessment: Evaluate the system’s password policy to ensure it is strong enough to resist brute-force attacks.
- Endpoint Security Assessment: Assess the security of all endpoints (e.g. laptops, desktops, servers) to ensure they are properly secured and patched.
- Patch Management Assessment: Evaluate the system’s patch management process to ensure all devices are up-to-date with the latest security patches.
- Employee Security Awareness Assessment: Test employees’ security awareness to determine if they are aware of and following security best practices.
- Access Control Assessment: Assess the system’s access control policies and procedures to ensure only authorized individuals have access to sensitive data.
- Data Backup and Recovery Assessment: Evaluate the system’s data backup and recovery plan to ensure it is effective and up-to-date.
- Incident Response Assessment: Review the system’s incident response plan to ensure it is effective and up-to-date, and that employees are trained on how to respond to security incidents.
- Web Application Security Assessment: Test the security of web applications that are hosted on the system.
- Wireless Network Security Assessment: Evaluate the security of the wireless network to ensure it is properly secured and protected from unauthorized access.
- Network Security Assessment: Conduct a network security assessment to identify any vulnerabilities in the system’s network infrastructure.
- Physical Security Assessment: Evaluate the physical security measures in place to protect the system’s hardware and data.
- Cloud Security Assessment: If the system uses cloud-based services, evaluate the security of those services to ensure they are properly secured and protected.
R55,000.00 – R250,000.00*
*This excludes any travel costs